[1] Farid H. Creating and Detecting Doctored and Virtual Images: Implications to the Child Pornography Prevention Act. Technical Report TR2004-518, Department of Computer Science, Dartmouth College, USA, 2004.
[2] 黄太云.刑事诉讼法修改释义.人民检察, 2012, (8):10-73 http://www.bookask.com/book/938711.html

Huang Tai-Yun. Interpretation of the amendment of the Criminal Procedure Law. People's Procuratorial Semimonthly, 2012, (8):10-73 http://www.bookask.com/book/938711.html
[3] Al-Qershi O M, Khoo B E. Passive detection of copy-move forgery in digital images:state-of-the-art. Forensic Science International, 2013, 231(1-3):284-295 doi: 10.1016/j.forsciint.2013.05.027
[4] Cao Y J, Gao T G, Fan L, Yang Q T. A robust detection algorithm for copy-move forgery in digital images. Forensic Science International, 2012, 214(1-3):33-43 doi: 10.1016/j.forsciint.2011.07.015
[5] Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G. A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 2011, 6(3):1099-1110 doi: 10.1109/TIFS.2011.2129512
[6] Bay H, Ess A, Tuytelaars T, Van Gool L. Speeded-up robust features (SURF). Computer Vision and Image Understanding, 2008, 110(3):346-359 doi: 10.1016/j.cviu.2007.09.014
[7] Fridrich J, Soukal D, Lukáš J. Detection of copy-move forgery in digital images. International Journal, 2003, 3(2):652-663 http://www.mendeley.com/catalog/detection-copymove-forgery-digital-images/
[8] Wang W, Dong J, Tan T N. Exploring DCT coefficient quantization effects for local tampering detection. IEEE Transactions on Information Forensics and Security, 2014, 9(10):1653-1666 doi: 10.1109/TIFS.2014.2345479
[9] Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004-515, Dartmouth College, USA, 2004
[10] Khan S, Kulkarni A. An efficient method for detection of copy-move forgery using discrete wavelet transform. International Journal on Computer Science and Engineering, 2010, 2(5):1801-1806
[11] 吕颖达, 申铉京, 陈海鹏.具有几何不变性的图像复制——粘贴盲鉴别算法.电子学报, 2016, 44(11):2592-2599 doi: 10.3969/j.issn.0372-2112.2016.11.005

Lv Ying-Da, Shen Xuan-Jing, Chen Hai-Peng. Blind forensic for image copy-paste tampering with geometric invariance. Acta Electronica Sinica, 2016, 44(11):2592-2599 doi: 10.3969/j.issn.0372-2112.2016.11.005
[12] 朱叶, 申铉京, 陈海鹏.基于彩色LBP的隐蔽性复制-粘贴篡改盲鉴别算法.自动化学报, 2017, 43(3):390-397 http://www.aas.net.cn/CN/abstract/abstract19017.shtml

Zhu Ye, Shen Xuan-Jing, Chen Hai-Peng. Covert copy-move forgery detection based on color LBP. Acta Automatica Sinica, 2017, 43(3):390-397 http://www.aas.net.cn/CN/abstract/abstract19017.shtml
[13] Johnson M K, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th Workshop on Multimedia and Security, MM&Sec 2005. New York, NY, USA: ACM Press, 2005. 1-10
[14] Chen M, Fridrich J, Goljan M, Lukas J. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security, 2008, 3(1):74-90 doi: 10.1109/TIFS.2007.916285
[15] Popescu A C, Farid H. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing, 2005, 53(10):3948-3959 doi: 10.1109/TSP.2005.855406
[16] Johnson M K, Farid H. Exposing digital forgeries through chromatic aberration. In: Proceedings of the 8th Workshop on Multimedia and Security, Mm&Sec 2006. Geneva, Switzerland: ACM Press, 2006. 48-55
[17] Farid H. Image forgery detection. IEEE Signal Processing Magazine, 2009, 26(2):16-25 doi: 10.1109/MSP.2008.931079
[18] Johnson M K, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security, 2007, 2(3):450-461 doi: 10.1109/TIFS.2007.903848
[19] Kee E, O'Brien J F, Farid H. Exposing photo manipulation from shading and shadows. ACM Transactions on Graphics, 2014, 33(5):Article No. 165 doi: 10.1145/2629646
[20] 牛少彰, 黄艳丽, 孙晓婷.投影与光照方向一致性的图像篡改检测.北京邮电大学学报, 2014, 37(5):61-65 http://www.cqvip.com/QK/91520A/201405/663517069.html

Niu Shao-Zhang, Huang Yan-Li, Sun Xiao-Ting. Image tampering detection by consistency of projection and lighting direction. Journal of Beijing University of Posts and Telecommunications, 2014, 37(5):61-65 http://www.cqvip.com/QK/91520A/201405/663517069.html
[21] 陈海鹏, 申铉京, 吕颖达, 金玉善.基于Lambert光照模型的图像真伪盲鉴别算法.计算机研究与发展, 2011, 48(7):1237-1245 http://mall.cnki.net/magazine/Article/JFYZ201107017.htm

Chen Hai-Peng, Shen Xuan-Jing, Lv Ying-Da, Jin Yu-Shan. Blind identification for image authenticity based on Lambert illumination model. Journal of Computer Research and Development, 2011, 48(7):1237-1245 http://mall.cnki.net/magazine/Article/JFYZ201107017.htm
[22] 孙鹏, 杨洪臣, 代雪晶, 沈喆.拼接篡改图像的色温估计取证方法.计算机辅助设计与图形学学报, 2012, 24(9):1193-1196 http://mall.cnki.net/magazine/Article/JSJF201209012.htm

Sun Peng, Yang Hong-Chen, Dai Xue-Jing, Shen Zhe. An authentification method for splicing images with color temperature estimation. Journal of Computer-Aided Design & Computer Graphics, 2012, 24(9):1193-1196 http://mall.cnki.net/magazine/Article/JSJF201209012.htm
[23] de Carvalho T J, Riess C, Angelopoulou E, Pedrini H, de Rezende Rocha A. Exposing digital image forgeries by illumination color classification. IEEE Transactions on Information Forensics and Security, 2013, 8(7):1182-1194 doi: 10.1109/TIFS.2013.2265677
[24] Gijsenij A, Lu R, Gevers T. Color constancy for multiple light sources. IEEE Transactions on Image Processing, 2012, 21(2):697-707 doi: 10.1109/TIP.2011.2165219
[25] Nakano N, Nishimura R, Sai H, Nishizawa A, Komatsu H. Digital still camera system for mega pixel CCD. IEEE Transactions on Consumer Electronics, 1998, 44(3):581-586 doi: 10.1109/30.713166
[26] Lee J S, Jung Y Y, Kim B S, Ko S J. An advanced video camera system with robust AF, AE, and AWB control. IEEE Transactions on Consumer Electronics, 2001, 47(3):694-699 doi: 10.1109/30.964165
[27] 周荣政, 何捷, 洪志良.自适应的数码相机自动白平衡算法.计算机辅助设计与图形学学报, 2005, 17(3):529-533 http://www.docin.com/p-426388884.html

Zhou Rong-Zheng, He Jie, Hong Zhi-Liang. Adaptive algorithm of auto white balance for digital camera. Journal of Computer-Aided Design & Computer Graphics, 2005, 17(3):529-533 http://www.docin.com/p-426388884.html
[28] Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E. An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security, 2012, 7(6):1841-1854 doi: 10.1109/TIFS.2012.2218597
[29] Ng T T, Hsu J, Chang S F. Columbia image splicing detection evaluation dataset[Online]. availabe: http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm, July 12, 2018